With an estimated 61% of Exchange servers in the wild still operating unpatched, this security flaw allows attackers to take over a vulnerable server using any set of valid email credentials.
I bet when you’ve read one of my articles about how scammers fool users out of their Office 365 credentials, you never dreamed the next use of those credentials would be to take over your organization’s Exchange server! But that’s exactly what’s possible with this vulnerability that has been published since February of this year .
Microsoft provided a patch for it on Patch Tuesday back in February, but newly updated Internet scan data from security vendor Rapid7 shows a massive number of Microsoft Exchange servers accessible from the Internet that are vulnerable to the published exploit. Some are running unsupported versions of Exchange, while others simply appear to not have been patched:
This news is terrifying! With administrative access to your organization’s Exchange servers, cybercriminals can run the gambit of scams – CEO fraud, brand and individual impersonation, business email compromise, island hopping to infect or scam partner or customer organizations, and more.
IT teams need to take steps to immediately patch any supported versions of Exchange Server, devise a plan to move off of any unsupported versions soon, and minimize Internet-based access to the Exchange environment.
CEO fraud has ruined the careers of many executives and loyal employees, causing over $26 billion in losses. Don’t be the next victim. This manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim.
[CRITICAL] 250,000 Microsoft Exchange Servers are Unpatched and Vulnerable to Remote Code Execution Attacks! just4validru, cvv4youcc